Institution
NTT DoCoMo
About: NTT DoCoMo is a based out in . It is known for research contribution in the topics: Base station & Mobile station. The organization has 4032 authors who have published 8655 publications receiving 160533 citations.
Topics: Base station, Mobile station, Transmission (telecommunications), Signal, Terminal (electronics)
Papers published on a yearly basis
Papers
More filters
•
19 Dec 2000TL;DR: In this paper, a location managing method for managing a location of a mobile station in a mobile wireless packet communication system is presented, where a route from a communication node positioned at the highest layer of the hierarchical structure to a base station of a cell in which a mobile Station is located, is managed as location information of the mobile station, by being distributed to each of communication nodes in the route to the base station.
Abstract: A location managing method for managing a location of a mobile station in a mobile wireless packet communication system in which each of communication nodes down to a base station have a hierarchical structure, wherein a route from a communication node positioned at a highest layer of the hierarchical structure to a base station of a cell in which a mobile station is located, is managed as location information of the mobile station, by being distributed to the communication node located at the highest layer of the hierarchical structure and to each of communication nodes in the route to the base station.
47 citations
•
26 Aug 2002TL;DR: In this paper, a handover is performed with a radio terminal apparatus (30) striding over base stations (34, 36), among edge routers (40, 42) provided in base stations, and the held data is transferred to the radio terminal device (30).
Abstract: When a handover is performed with a radio terminal apparatus (30) striding over base stations (34, 36), among edge routers (40, 42) provided in base stations (34, 36), respectively, an edge router (40) which has been connected to a radio terminal device (30) prior to movement instructs a relay router (48) connected to the edge router (40) and all the edge routers (42) of the base station (36) becoming a movement destination candidate to hold data from a communication partner. The data held by the relay router (48) by the instruction is instructed to be transferred to the radio terminal device (30) after movement after the handover and the held data is transferred to the radio terminal device (30). Thus, it is possible to realize packet data transfer to the radio terminal device after movement in the handover control via an optimal route, thereby effectively using the network resource and simplifying the handover processing.
47 citations
•
02 Oct 2001TL;DR: In this paper, a service desk server receives trouble ticket information TC showing a fault status of a device, whereupon incident information X is generated (t0). Subsequently, the faulty service name is retrieved from fault information table based on the troubleshooting TC.
Abstract: A service desk server receives trouble ticket information TC showing a fault status of a device, whereupon incident information X is generated (t0). Subsequently, the faulty service name is retrieved from fault information table based on the trouble ticket information TC. The service desk server then enters the service name in a template to generate fault notification message data html1 and html2 for transfer to a first and a second web server, respectively. Each of first and second web servers is thereby prompted to post a fault notification on their web site, on the basis of fault notification message data html1 and html2. Thus, fault information can be automatically notified to end users.
47 citations
•
24 Mar 2009TL;DR: In this article, a handover control method for a plurality of different frequency cells at predetermined measurement intervals is proposed. But the handover is not considered in this paper, and the handoff control method is limited to the case where the radio quality in a specific frequency cell has a high priority.
Abstract: A handover control method comprises: a step in which a mobile station measures radio qualities in a plurality of different frequency cells at predetermined measurement intervals; and a step in which the mobile station, when determining that the radio quality in a specific frequency cell satisfies a report condition, starts up a timer for measuring the time during which the radio quality in the specific frequency cell continues to satisfy the report condition and, when the timer has expired, transmits to a radio base station a measurement report including the radio quality in the specific frequency cell. The mobile station, after determining that the radio quality in a second frequency cell satisfies the report condition and starting up a second timer, stops the second timer and starts up a first timer when determining that the radio quality in a first frequency cell having a higher priority than that of the second frequency cell satisfies the report condition.
47 citations
•
17 Feb 2006TL;DR: In this article, a method and system for determining a shared secret between two entities in a cryptosystem is presented, where a first random secret is selected that is known to the first entity and unknown to the second entity.
Abstract: A method and system are provided for determining a shared secret between two entities in a cryptosystem. A first random secret is selected that is known to the first entity and unknown to the second entity. A first intermediate shared secret component is determined using the first random secret and a system parameter. The first intermediate shared secret component is communicated to the second entity. A second random secret is selected that is known to the second entity, but unknown to the first entity. A second intermediate shared secret component is determined using the second random secret and the system parameter. The second intermediate shared secret component is communicated to the first entity. It is confirmed that both the first entity and the second entity know a non-interactive shared secret. An interactive shared secret is determined using the first random secret, the second random secret, and the system parameter.
47 citations
Authors
Showing all 4032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Amit P. Sheth | 101 | 753 | 42655 |
Harald Haas | 85 | 750 | 34927 |
Giuseppe Caire | 82 | 825 | 40344 |
Craig Gentry | 75 | 222 | 39327 |
Raj Jain | 64 | 424 | 30018 |
Karl Aberer | 63 | 554 | 17392 |
Fumiyuki Adachi | 54 | 1010 | 15344 |
Ismail Guvenc | 52 | 451 | 13893 |
Frank Piessens | 52 | 391 | 10381 |
Wolfgang Kellerer | 49 | 502 | 9383 |
Yoshihisa Kishiyama | 48 | 379 | 11831 |
Ravi Jain | 48 | 160 | 7467 |
Josef A. Nossek | 48 | 623 | 10377 |
Tadao Nagatsuma | 47 | 430 | 11117 |
Christian Bettstetter | 46 | 204 | 11051 |